Loading...
HomeMy WebLinkAbout28 0545 System Integration_Technical Guideline Spec_2024-07-12Tarrant County College District 2024-07-12 Technical Guideline Spec Electronic Security Systems Page 1 SYSTEM INTEGRATION 28 0700 - 1 SECTION 28 0545 SECURITY SYSTEM INTEGRATION PART 1 - GENERAL 1.01 SUMMARY A. Section includes the provision of mechanisms which shall support the exchange and recognition of information and commands between Electronic Security Systems (ESS) at TCCD facilities. 1.02 DESCRIPTION A. General Description: This specification section covers the provision of mechanisms which will support the exchange and recognition of information and commands between various security system applications to automate functions at the Security Monitoring Center and Police Department Dispatch. B. Contractor shall coordinate with providers of systems listed herein to provide equipment, software, and configuration that will support the required functionality and performance. C. Systems to be connected for data sharing: 1. EACS (Lenel OnGuard) and VSS (Milestone xProtect) 2. ECS (system to be selected) and VSS 3. EACS and ENS (Alertus) 1.03 RELATED WORK A. Provide the work in accordance with Section 28 0000, Security System General Requirements. 1.04 SHOP DRAWINGS & EQUIPMENT SUBMITTAL A. Provide the work in accordance with Section 28 0000, Security System General B. In addition to the requirements of Section 28 0000, provide the following information for each system to be integrated: 1. Describe the integration architecture between systems. Provide a single-line diagram showing relationships between integrated components. The contractor may use the construction document drawings as the basis for these integration drawings. 2. If a central integration processing component or user-interface (server, application) is proposed, describe the hardware and application software proposed. 3. A detailed description of how the interface will be accomplished between each system, including proposed connectivity, hardware, software, language, protocols, procedures, and standards. 4. Proposed Software Development Kit (SDK) or Application Interface (API) and Tarrant County College District 2024-07-12 Technical Guideline Spec Electronic Security Systems Page 2 SYSTEM INTEGRATION 28 0700 - 2 Version, where an SDK/API already exists from the component manufacturer. Provide development and capabilities information on the SDK/API and its proposed use on this project. a. An existing API exists for the EACS/VSS integration. Contractor shall include all licenses required to implement the integration for this project. 5. Development specification for custom software development, where the interface must be created specifically for the project. 6. A detailed list, or matrix, of information, commands, and other elements of the interface, delineating exactly what functions will be supported between each system, and how they will work. 1.05 OPERATIONS AND MAINTENANCE MANUALS A. Provide the work in accordance with Section 28 0000, Security General Requirements. 1.06 WARRANTY A. Provide the work in accordance with Section 28 0000, Security General Requirements. 1.07 QUALITY ASSURANCE A. Provide the work in accordance with Section 28 0000, Security General Requirements. 1.08 SERVICE AND MAINTENANCE A. Provide the work in accordance with Section 28 0000, Security General Requirements. 1.09 TRAINING A. Provide the work in accordance with Section 28 0000, Security General Requirements. 1.10 EQUIPMENT COMPATIBILITY REQUIREMENTS A. Provide the work in accordance with Section 28 0000, Security General Requirements. 1.11 OWNER’S RIGHT TO USE EQUIPMENT A. Provide the work in accordance with Section 28 0000, Security General Requirements. 1.12 TECHNICAL REQUIREMENTS, ELECTRONIC SECURITY SYSTEM (ESS) INTEGRATION A. General 1. The Contractor shall be responsible for providing hardware and software interfaces to achieve the specified system performance described herein and, by reference, realize absolute and seamless compatibility with the related component systems. 2. The Contractor shall ensure system additions and modifications provided under this scope of work have no negative effect on the individual components and systems, and their core functionality, and no permanent effect beyond that specified or implied by the scope of work. Tarrant County College District 2024-07-12 Technical Guideline Spec Electronic Security Systems Page 3 SYSTEM INTEGRATION 28 0700 - 3 3. Systems should be connected together using encrypted authenticated communications following the manufacturer's recommendation and TCCD guidelines for zero-trust communications. B. Purpose 1. Integration is the process of designing, deploying, and configuring independently operating systems with the ability to request, receive, extract, process, and act upon information from other systems. 2. Successful system integration must address three fundamental issues: a. Functionality: What information is needed, how it is to be requested and processed, and what functions or activities need to occur upon receipt of the information. b. Connectivity: How systems will be connected together to support the communication of information and commands. (Special interfaces, wiring, networks, databases.) c. Communication: How information will be communicated between systems. (Instruction sets, language, protocols, formats, priority) C. Environment 1. Infrastructure and Connectivity a. Communications between the EACS, VSS, and ECS systems/servers shall be completed under a separate project. Primary integration licensing between the EACS and VSS has been obtained by TCCD. The contractor shall confirm completion of communications between the systems with TCCD Electronic Security Department. b. The operator workstations responding to the automated function are located in the Security Monitoring Center and PD Dispatch located at the Trinity River campus. D. Attributes 1. The attributes of the integrated environment are primarily defined by the subsystems that are to be integrated. Verify existing system components to be expanded by this project. 2. Integrated systems comprise of the processors, software, electrical control panels, data gathering panels, special data interfaces, and converters required to allow systems to communicate with each other, process information, and allow users to program and perform operations. 3. The following systems will be a part of the integrated environment: a. Electronic Access Control System (EACS) – Lenel OnGuard b. Video Surveillance System (VSS) – Milestone xProtect Corporate c. Emergency Phone System (ECS) – TBD d. Emergency Notification System (ENS) Alertus E. Functions 1. User Interface: In instances where data messages are not automatically sent between systems based on the interface but require the user to enter data to create a data transfer stream, the interface shall use a graphical type interface to set up the Tarrant County College District 2024-07-12 Technical Guideline Spec Electronic Security Systems Page 4 SYSTEM INTEGRATION 28 0700 - 4 communications requirements. The user shall not be required to enter program code to make the interface functional when adding new data streams. 2. The system shall provide the following automated processing rules, at a minimum: a. The object of “system integration” is to automatically configure the system to display, record and report appropriate system activity to various elements of the system. Automatic configuration can free operators from difficult control tasks, give the operator more time to respond to events, reduce operator error, and ensure critical system tasks occur consistently. b. General Interface Description: System integration shall accomplish the following functions. 1) The ESS shall provide automatic camera call-up on alarm activation. Alarms generated by the EACS shall be transmitted to the VSS to display one or more cameras associated with the alarm. 2) The ESS shall provide automatic camera call-up on ECS activation. When an ECS is activated the call shall be transmitted to the VSS to display one or more cameras associated with the ECS station initiating the call. This integration shall allow ECS calls to be answered from the VSS operator workstation application at the Security Monitoring Center of Police Department Dispatch. c. Event-Initiated Interface, General: 1) The system shall support the capability to send and receive alarm and control messages between designated systems via a secure encrypted network communications link, using API, XML, or other industry- standard communication languages and formats, and shall act upon those messages received. 2) Where integration may require the implementation of other than a network-based communications link, Contractor shall propose such integration for approval, before proceeding with the work. 3) All software routines required to perform the required data-interface with external equipment and controls will be fully developed, installed, tested and supported by the Contractor. 4) Communication of event information between systems shall take place automatically and immediately, when the event is sensed by the system. 5) “Hard-wired” interfaces used to support interactive video surveillance cameras, intelligent video, threat-based control, and other event- initiated functions shall not be acceptable, except as otherwise noted herein or shown on the design drawings. 3. VSS/EACS System Integration: Upon receiving event/alarm information from the EACS, the VSS shall transmit camera pre-positioning commands to applicable cameras, and shall cause the system to process, display, and record applicable PTZ and fixed cameras at a predefined frame-rate and resolution. a. EACS Interface: When an alarm is received by the EACS the system shall automatically generate a message and send it to the VSS. The EACS/VSS integration application shall be design to allow the user to select an EACS device, select the alarm/event condition and then select the camera or cameras to be displayed on that alarm/event. The interface shall allow the user to select Tarrant County College District 2024-07-12 Technical Guideline Spec Electronic Security Systems Page 5 SYSTEM INTEGRATION 28 0700 - 5 which cameras are displayed and which monitor(s) and panes within the alarm monitor window those camera images are displayed. The interface can be designed for the user input to be done on either the EACS or VSS. The contractor shall coordinate with Lenel and Milestone to determine the best way to implement the interface. Upon receiving an alarm message, the VSS shall 1) Automatically select, position, and focus one or more cameras on areas of concern; 2) Automatically re-configure recording for the selected cameras, to record them in an enhanced format, at the highest available resolution, frame rate, and quality (all other cameras remain at their pre-programmed format); 3) Automatically display the selected cameras on one or more monitors, client workstations, and other display devices, in a pre- selected configuration (single or multi-camera views). 4) The following alarm/events shall be configured for automatic camera call-up: a) Door Forced b) Door Propped c) Invalid Card read b. EACS/VSS Configuration: For every EACS device that can provide an alarm condition (door position switches and duress switches) the VSS shall display 4 or more cameras associated with that alarm activation. When a Security Monitoring Center Operator or PD Dispatch Operator acknowledges the alarm, the cameras shall be displayed in a 2x2 format on their monitor. 1) For perimeter doors the associated cameras shall be the interior camera viewing the door and a second interior camera that will be able to monitor the person once they are no longer in the view of the primary interior camera. The 3rd camera shall be the closet exterior camera viewing the perimeter door and the nearest exterior PTZ camera. Note that a number of exterior cameras have multi-imagers. The contractor shall select the imager that is viewing the door. 2) For stairwell alarms the following cameras shall be automatically displayed: The two corridor cameras on the floor where the alarm occurs, the elevator lobby camera on the floor that generates the stairwell alarm, the cameras viewing the exit doors on floors 1 and 2, and the cameras viewing the elevator lobby on floors 1 and 2. 3) When there is more than one alarm the alarms shall be stored in the alarm queue and the operator shall be able to select any alarm and its associated cameras. c. Visual Tracking: The Milestone system provides a visual tracking function. This function allows the addition of semi-transparent shapes, or overlays, on a camera view that link to another camera. For each camera the contractor shall program an overlay for each camera adjacent to a camera. The overlays shall be placed on the camera view on the left, right, top, and/or bottom to indicate the relative location of the adjacent camera as a person walks out of the view. Tarrant County College District 2024-07-12 Technical Guideline Spec Electronic Security Systems Page 6 SYSTEM INTEGRATION 28 0700 - 6 The number of overlays are dependent on the available directions a person can move out of view of a camera. There shall be a minimum of two overlays per camera. For multi-imager cameras the overlays may link to a separate stream within the same camera. 4. ECS/VSS System Integration: Upon a call activation from the ECS, the VSS shall transmit camera pre-positioning commands to applicable cameras, and shall cause the system to process, display, and record applicable PTZ and fixed cameras at a predefined frame-rate and resolution. a. Event identifying the calling device is sent from the ECS to the VSS and pre- configured cameras are displayed on the Security Monitoring Center video wall. Coordinate with TCCD Electronic Security Department to determine which monitor shall display the associated cameras. b. The call is annunciated at the two Security Monitoring Center workstations. 1) If neither station answers the call with 10 seconds the call rolls over to the PD Dispatch Operator’s workstation. 2) If the PD Dispatch Operator doesn’t answer the call with 10 seconds the call forward to the PBX operator. c. One of the two Security Monitoring Center workstations answers the call and establishes communication to the calling device. 1) The ECS sends an event to the VSS displaying the pre-configured cameras on the workstation answering the call. 2) The operator shall have the capability to display the cameras on their workstation and/or the videowall monitor in front of their workstation if needed. This will allow staff to view the event without interfering with the operator’s tasks. 3) The Security Monitoring Center staff member answering the call communicates with the calling party and assess the situation. If required by operation protocols the operator dispatches appropriate staff to respond. 4) If the Security Monitoring Center operator identifies a person of interest within view of the camera and the person of interest begins to leave the area, they will move into view of one of the adjacent cameras. The Security Monitoring Center operator can click in the window of the camera viewing the person and that camera will become the primary camera and move to the large window with new secondary cameras displayed in the smaller windows. The Security Monitoring Center operator can continue to follow the person of interest while they are within view of a camera connected to the VSS. This function allows an operator to follow an individual without needing to know which camera needs to be displayed. d. When the operator disconnects from the calling device a message will display on the ECS screen asking the operator to end the incident. The operator will have two options; 1) End the incident which will send an event to the VSS to set the video wall monitors and the operator’s monitor return back to normal operations Tarrant County College District 2024-07-12 Technical Guideline Spec Electronic Security Systems Page 7 SYSTEM INTEGRATION 28 0700 - 7 or; 2) The operator can select to continue the incident even after communications had ended to allow the operator to continue to follow the person of interest. Once the operator has determined the incident is no longer active, they can end the incident which will put all involved monitors back to normal operation. 5. The integration shall provide access to the ECS system directly from the VSS application. 6. An operator shall be able to answer a ECS call directly from the VSS application. 7. The integration shall provide a list of ECS devices on the VSS application. The integration shall provide an all call/group call function from the VSS application. This function shall provide a manual voice announcement of a prerecorded message to be selected for each group. The prerecorded function shall provide a pull-down list of messages with the capability to repeat the message for a set number of times selectable by the user. PART 2 - PRODUCTS 2.01 INTEGRATION LICENSES A. Video Surveillance System (VSS) 1. Provide Milestone license required for integration to the Lenel/S2 EACS a. Milestone Part XPABL – XProtect Access Control Base License 2. Provide Milestone licenses required for each device integration between Lenel/S2 and Milestone. a. Milestone Part APADL – XProtect Access Reader License b. Provide the number of licenses required for the number of Lenel/S2 readers that are communicating with the Milestone system. 3. Include 1-year warranty on software and labor. B. Emergency Call System (ECS) 1. Provide license required to integrate the ECS with the VSS 2. Provide licenses as required for each ECS device connected to the VSS. 3. Include 1-year warranty on software and labor. C. Provide 16 hours of Milestone Pro Services to assist in the installation and configuration of the VSS to send event messages from the ECS to the VSS to provide automatic camera call- up. The Pro Services can also be used to assist the contractor in any other programming and configuration issues that may arise. D. Provide Snap Surveillance FMX software to provide the capability to follow targets as described above. Snap Surveillance is a third-party software program that functions with Milestone XProtect software. Provide the software and any required licenses to meet the specified functionality. Tarrant County College District 2024-07-12 Technical Guideline Spec Electronic Security Systems Page 8 SYSTEM INTEGRATION 28 0700 - 8 PART 3 - EXECUTION 3.01 GENERAL A. Provide the work in accordance with Section 28 0000, Security General Requirements. 3.02 COORDINATION A. The contractor shall coordinate with each of the manufacturers to implement the data communications interfaces between each system. B. The contractor shall coordinate with TCCD Electronic Security Department to implement the interfaces and user interface to meet Security Monitoring Center and PD Dispatch operations requirements. The contractor shall coordinate how the operator’s actions will determine what the systems shall do. C. The contractor shall coordinate the requirements from each manufacturer involved in any integration scheme to provide professional services as needed to implement the integration requirements. 3.03 SYSTEM CONFIGURATION A. EACS/VSS Configuration Tasks: 1. General: The contractor shall comply with all programming requirements as provided by Milestone and Lenel/S2 for implementation of the communications and software interface between the systems. 2. The contractor shall load any required software on the EACS and VSS to provide the required interface functions. The contractor shall provide any licenses required for the EACS and VSS to implement the communications and software interface functions. The contractor shall configure the software to comply with all TCCD requirements. TCCD will provide IP addresses as needed and coordinate required port settings and any other configuration settings required to allow communication between the EACS and VSS to provide the required functions. a. Provide a license for each door to be integrated. 3. Configure IP addresses and ports to allow communications between the EACS and VSS servers. Coordinate all IP addresses and port configuration with TCCD. Coordinate with TCCD to ensure all cyber security requirements are addressed. 4. Set-up and configure EACS and VSS to send messages to the VSS on EACS designated alarm point activation and display the cameras in the designated window view on the VSS. The contractor shall create a schedule of alarm/events generated by the Lenel/S2 system and the associated cameras to be displayed. Refer to the attached sample schedule to identify how designated alarms and corresponding camera call- ups may be configured. The contractor may submit their own schedule for review by TCCD. 5. Assign primary and secondary cameras associated with each EACS alarm/event. Configure VSS screen layout for each configuration. The primary camera shall be in a large window with the secondary cameras in smaller windows adjacent to the primary camera. Initial configurations: Tarrant County College District 2024-07-12 Technical Guideline Spec Electronic Security Systems Page 9 SYSTEM INTEGRATION 28 0700 - 9 a. Configuration 1: Large window in the top left quadrant of the monitor with three smaller windows below and two to the right (6 total views). (Refer to attached layout) b. Configuration 2: Large window in the top center of the monitor with four small windows below and two to the right and left (9 total views). (Refer to attached layout) 6. Configure the Milestone system to provide the capability of the operator to select a camera and have secondary cameras displayed as described in Configuration 2 in item 5.b. above. This configuration shall allow an operator to follow a person throughout the facility as described in Sequence of Operation item 7. a. 3) d) below. This shall apply to all cameras located at each campus or facility. 7. Sequence of Operation. a. EACS alarm/event is activated. 1) The EACS sends a message to the VSS and pre-configured cameras are displayed on one of the monitors of the video wall. 2) The alarm/event is annunciated at both the Security Monitoring Center and PD Dispatch workstations. The alarm will display the Lenel/S2 alarm screen with a blinking message in red and provide an audible sound to alert the operator. 3) One of the workstations responds to the alarm/event and establishes control of the alarm/event by acknowledging the alarm. a) The EACS sends message to the VSS displaying the pre-configured cameras on the workstation responding. b) The pre-configured cameras are also displayed on the Security Monitoring Center video wall monitor directly above the workstation answering the call and the center monitor of the video wall will display a map of the site or specific floor plan related to the location of the alarm. c) A dialog box related to the alarm shall pop-up with instructions to the operator in the top section of the pop-up window and the capability to enter the steps taken to respond to the alarm in the lower section of the pop-up window. (Note the exact orientation of the alarm message window and text message window may vary based on Lenel/S2 specific programming). d) If the operator identifies a person of interest within view of the camera and the person of interest begins to leave the area, they will move into view of one of the adjacent cameras. The operator can click in the window of the camera viewing the person and that camera will become the primary camera and move to the large window with new secondary cameras displayed in the smaller windows. The operator can continue to follow the person of interest while they are within view of a camera connected to the VSS. This function allows an operator to follow an individual without needing to know which camera needs to be displayed. 4) When the operator is finished responding to the alarm/event they will Tarrant County College District 2024-07-12 Technical Guideline Spec Electronic Security Systems Page 10 SYSTEM INTEGRATION 28 0700 - 10 clear the alarm. This will return the operator’s workstation and the video wall back to their default settings. The alarm message, the cameras recordings associated with the alarm and the text entered by the operator shall be saved as an event for later retrieval to assess the alarm and response. 8. Sequence of Operation (Alternate Bid #1) a. This sequence of operation shall be the same as described in item 5 above with the additional functionality. 1) When an operator responds to an alarm/event and displays the pre- configured cameras on their workstation monitor and the video wall monitor above their workstation the VSS shall display an associated map of the facility based on the primary camera being displayed. 2) On the displayed map all the cameras connected to the VSS shall be displayed. a) The primary camera shall be displayed as a red icon to easily identify the location of the primary camera. b) The other cameras shall be displayed in an alternate color to identify the cameras that an individual being monitored could walk into the view of that would then allow that camera to be selected as the primary camera. Coordinate color selection with TCC c) As the operator selects a camera for viewing as the subject being monitored moves into view of a different camera the new primary camera shall be displayed in red to allow the operator to easily identify the camera on the map the is being viewed as the primary camera. B. ECS/VSS Configuration Tasks: 1. The contractor shall load the ECS management software and maintenance software of the VMWare server provided by TCCD. The contractor shall configure the software to comply with all TCCD requirements. TCCD IT will provide IP addresses as needed and coordinate required port settings and any other configuration settings required to allow communication with all Emergency Call devices and the client workstations. 2. Coordinate with TCCD IT to set-up server OS image per TCCD requirements and as required for the ECS software to operate properly and communicate with all devices. 3. Install and configure the ECS software on the provide VMWare server. 4. Install and configure the ECS client software on all Monitoring Center and PD Dispatch workstations as designated by TCCD. 5. Activate all required licenses. 6. Begin transition of ECS devices from the campus IP phone system to the ECS. a. Transition the first Emergency Call Station to the ECS and test operation at all workstations. b. Transition all remaining ECS devices to the ECS server and verify operation for each. 7. Set-up and configure ECS and VSS to allow the ECS to send event information to the VSS. Event shall be activation of the call button on an ECS device. a. TCC shall provide a communication path between the ECS server and the VSS Tarrant County College District 2024-07-12 Technical Guideline Spec Electronic Security Systems Page 11 SYSTEM INTEGRATION 28 0700 - 11 management server located in the Trinity River Data Center. b. The Contractor shall be responsible to program the ECS and VSS to allow the VSS to received event messages from the ECS and display the assigned cameras based on the ECS device generating the event. c. The Contractor shall include an “END EVENT” function in the VSS. The END EVENT can be an icon on the monitor or a hot key on the keyboard. Activating the END Event will return the video displays to the default configuration. 8. Assign primary and secondary cameras associated with each ECS device. Configure VSS screen layout for each configuration. The primary camera shall be in a large window with the secondary cameras in smaller windows adjacent to the primary camera. Initial configurations: a. Configuration 1: Large window in the top right quadrant of the monitor with three smaller windows below and two to the right (6 total views). (Refer to attached layout) b. Configuration 2: Large window in the top center of the monitor with four small windows below and two to the right and left (9 total views). Refer to attached layout) 9. VSS Camera Configuration and Setup a. The Contractor shall assign a primary camera for each ECS device. The primary camera shall have the best view of the ECS device initiating a call. The contractor shall create a schedule of alarm/events generated by the ECS and the associated cameras to be displayed. Refer to sample schedule for additional information. b. The Contractor shall assign five secondary cameras to each primary camera. The secondary cameras will be adjacent to the primary camera and shall be able to view a subject if they are no longer in the view of the primary cameras. Refer to the schedule for additional information. c. The VSS shall be configured to assign five secondary cameras to each camera within the scope of the project even if a camera is not used as a primary camera related to events initiated by the ECS. This setup shall allow an operator to follow a subject throughout the facility manually. The operator shall be able to manually activated this feature even if an event has not occurred. Note: All campus cameras have not yet been installed. It is possible a secondary camera may not be available at the time of this project. In that instance one or more of the secondary camera tiles may be blank and will be filled in when the other projects related to camera installation are completed. Refer to the schedule for additional information. 10. Sequence of Operation. a. ECS device call button is activated. 1) Event identifying the calling device is sent from the ECS to the VSS and pre-configured cameras are displayed on the center monitor of the Security Monitoring Center video wall. 2) The call is annunciated at the Security Monitoring Center and PD Dispatch workstations. b. One of the workstations answers the call and establishes communication to the calling device. Tarrant County College District 2024-07-12 Technical Guideline Spec Electronic Security Systems Page 12 SYSTEM INTEGRATION 28 0700 - 12 1) The ECS sends an event to the VSS displaying the pre-configured cameras on the workstation answering the call. 2) The operator shall have the capability to display the cameras on their workstation on the videowall monitor in front of their workstation if needed. This will allow staff to view the event without interfering with the operator’s tasks. 3) The operator answering the call communicates with the calling party and assess the situation. If required by operation protocols the operator dispatches appropriate staff to respond. 4) If the operator identifies a person of interest within view of the camera and the person of interest beings to leave the area, they will move into view of one of the adjacent cameras. The operator can click in the window of the camera viewing the person and that camera will become the primary camera and move to the large window with new secondary cameras displayed in the smaller windows. The operator can continue to follow the person of interest while they are within view of a camera connected to the VSS. This function allows an operator to follow an individual without needing to know which camera needs to be displayed. c. When the operator disconnects from the calling device a message will display on the ECS screen asking the operator to end the incident. The operator will have two options; 1) End the incident which will send an event to the VSS to set the video wall monitors and the operator’s monitor back to normal operations or; 2) The operator can select to continue the incident even after communications had ended to allow the operator to continue to follow the person of interest. Once the operator has determined the incident is no longer active, they can end the incident which will put all involved monitors back to normal operation. 11. Sequence of Operation (Alternate Bid #1) a. This sequence of operation shall be the same as described in item 8 above with the additional functionality. 1) When a Security Monitoring Center operator answers a call and displays the pre-configured cameras on their workstation monitor and the video wall monitor above their workstation the VSS shall display an associated map of the facility based on the primary camera being displayed. 2) On the displayed map all the cameras connected to the VSS shall be displayed. a) The primary camera shall be displayed as a flashing red icon or other graphic symbol to easily identify the primary camera being viewed.to easily identify the location of the primary camera. b) Note that the color selection can be modified by the user to be easier to see if the colors selected herein are not acceptable. C. The contractor shall program the layout of the cameras on the building site and floor plans. CAD or PDF files of the plans shall be provided to the contractor by TCCD to create the maps. Tarrant County College District 2024-07-12 Technical Guideline Spec Electronic Security Systems Page 13 SYSTEM INTEGRATION 28 0700 - 13 3.04 WORKMANSHIP A. Provide the work in accordance with Section 28 0000, Security General Requirements. 3.05 EQUIPMENT, RACK AND CONSOLE INSTALLATION A. Provide equipment, rack, and console installation in accordance with Section 28 0000, Security General Requirements. 3.06 GROUNDING PROCEDURES A. Provide grounding of all systems and equipment in accordance with Section 28 0000, Security General Requirements. 3.07 CONDUIT AND WIRE INSTALLATION PRACTICES A. Provide conduit, wire and cable installation in accordance with Section 28 0000, Security General Requirements. 3.08 IDENTIFICATION AND TAGGING A. Provide identification of wire, panels, and devices in accordance with Section 28 0000, Security General Requirements. 3.09 DATABASE PREPARATION, CHECKING, AND ACTIVATION A. Provide database preparation, checking and activation for systems and equipment in accordance with Security General Requirements, Section 28 0000. B. Contractor shall coordinate with the TCCD to determine the required pre- programmed surveillance, rule-setting, and event-initiated configurations. C. The interface between the EACS and VSS for automatic camera functions on the VSS shall be configured to allow operator input to select which cameras are associated with each alarm and which monitor(s) the video will be displayed. Upon the VSS receiving an alarm message the associated camera(s) shall be recoded per the camera alarm recording settings programmed into the VSS. 3.10 START-UP RESPONSIBILITY A. Provide start-up services for systems and equipment in accordance with Security General Requirements, Section 28 0000. 3.11 3.11 SYSTEM PERFORMANCE TESTING AND ADJUSTING PROCEDURES A. Provide performance testing, burn-in, and adjusting of systems and equipment in accordance with Section 28 0800, Testing and Commissioning. Tarrant County College District 2024-07-12 Technical Guideline Spec Electronic Security Systems Page 14 SYSTEM INTEGRATION 28 0700 - 14 B. Performance Testing 1. Demonstrate the operation of each camera that is associated with an EACS alarm/event. 2. Demonstrate the operation of each camera that is associated with each ECS phone. 3. Demonstrate automated call-up, pre-positioning, and graphical map control of each camera, from the VSS GUI screens. 3.12 FINAL PROCEDURES A. Perform final procedures in accordance with Section 28 0000, Security General Requirements. END OF SECTION